Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

[PDF][PDF] Trusted user authentication using biometrics

Q Xiao, RD Defence - DRDC Ottawa TM, 2002 - cradpdf.drdc-rddc.gc.ca
User authentication is the process of confirming one's identity by checking one's credentials.
It is a cornerstone of information security. Traditionally, users access information systems by …

Assessment of how users perceive the usage of biometric technology applications

T Habibu, ET Luhanga, AE Sam - Recent Advances in Biometrics, 2022 - books.google.com
Biometrics applications are progressively widespread as a means of authenticating end-
users owing to the extensive range of benefits over traditional authentication (token-base …

A survey on biometric authentication: Toward secure and privacy-preserving identification

Z Rui, Z Yan - IEEE access, 2018 - ieeexplore.ieee.org
In order to overcome the difficulty of password management and improve the usability of
authentication systems, biometric authentication has been widely studied and has attracted …

Security and accuracy of fingerprint-based biometrics: A review

W Yang, S Wang, J Hu, G Zheng, C Valli - Symmetry, 2019 - mdpi.com
Biometric systems are increasingly replacing traditional password-and token-based
authentication systems. Security and recognition accuracy are the two most important …

Enhancing security and privacy in biometrics-based authentication systems

NK Ratha, JH Connell, RM Bolle - IBM systems Journal, 2001 - ieeexplore.ieee.org
Because biometrics-based authentication offers several advantages over other
authentication methods, there has been a significant surge in the use of biometrics for user …

Biometric system security

A Adler - Handbook of biometrics, 2008 - Springer
Security is “freedom from risk or danger”, while computer and data security is “the ability of a
system to protect information and system resources with respect to confidentiality and …

A study of users' compliance and satisfied utilization of biometric application system

T Habibu, ET Luhanga, AE Sam - Information Security Journal: A …, 2021 - Taylor & Francis
Currently, the adoption rate of biometric technology has speedily grown in all applications.
The technology is considered as an effective measure for the protection against crime …

Biometrics: when identity matters

A Ross, AK Jain - Chinese Conference on Biometric Recognition, 2004 - Springer
Establishing the identity of a person is becoming critical in our vastly interconnected society.
Questions like “Is she really who she claims to be?”,“Is this person authorized to use this …

Analyzing and comparing public perception of facial recognition, iris verification and fingerprints based authentication systems

S Riaz, A Mushtaq, H Ibrar - 2022 8th International Conference …, 2022 - ieeexplore.ieee.org
When it comes to everyday living, biometric devices play an important part. It is, therefore,
imperative to evaluate usability and vulnerability of biometric technologies. In Oct. 2021 …